AppSec Blog

Secure Coding iPhone and iPad Apps Against MiTM

This is a guest post from security researcher Nitesh Dhanjani. Nitesh will be giving a talk on "Hacking and Securing Next Generation iPhone and iPad Apps" at SANS AppSec 2011. Many iOS applications use HTTP to connect to server side resources. To protect user-data from being eavesdropped, iOS applications often use SSL to encrypt their … Continue reading Secure Coding iPhone and iPad Apps Against MiTM


Spot the Vuln - Banks - Cross Site Scripting

Details Affected Software: PunBB Fixed in Version: 1.3 Issue Type: Cross Site Scripting (XSS) Original Code: Found Here Description Passwords, passwords, passwords. For some reason, developers sometimes assume passwords values are safe and do not need encoding. In this example, the developers chose to encode username values (line 87) however, they assumed password values would … Continue reading Spot the Vuln - Banks - Cross Site Scripting


How Not to Store Passwords in iOS

The WordPress iOS App I was looking for an open source iOS application and quickly came across the WordPress app. Once you log in to your WordPress blog via the app your credentials are then stored on the device itself. If done correctly this is not necessarily a bad thing. However, the WordPress app's implementation … Continue reading How Not to Store Passwords in iOS


Spot the Vuln - Banks

I have always been afraid of banks. - Andrew Jackson Spot the Vuln uses code snippets from open source applications to demonstrate vulnerabilities in real world web applications. Every Monday morning a vulnerable code snippet is posted. Take a look at the vulnerable code and try to identify where the security vulnerability is. Every Friday, … Continue reading Spot the Vuln - Banks


Spot the Vuln - Tougher - SQL Injection

Details Affected Software: PunBB Fixed in Version: 1.3 Issue Type: SQL Injection (SQLi) Original Code: Found Here Description This week's bug was an old SQL injection bug that affected PunBB versions < 1.3. In short, a value is taken from an attacker/user controlled POST request and is used to build a SQL statement. This bug … Continue reading Spot the Vuln - Tougher - SQL Injection